cyber crime ppt

Views:
 
     
 

Presentation Description

No description available.

Comments

By: farazmtariq (61 month(s) ago)

Perfect time of the upload as I got the same presentation on Wednesday!!!

Presentation Transcript

PowerPoint Presentation:

S.I.E.S. College Of Arts, Science And Commerce Foundation Course Presentation 1

PowerPoint Presentation:

2

What is CYBER CRIME?:

What is CYBER CRIME? "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)". There are crimes that are only committed while being on the Internet and are created exclusively because of the World Wide Web.  3

History of CYBER CRIME:

History of CYBER CRIME The first recorded cyber crime took place in the year 1820! In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime! 4

Who are CYBER CRIMINALS?:

Who are CYBER CRIMINALS? Kids (age group 9-16 etc.) Organized hacktivists Disgruntled employees Professional hackers 5

PowerPoint Presentation:

Who are CYBER CRIMINALS? 6

Categories of CYBER CRIME:

Categories of CYBER CRIME We can categorize cyber crime in two ways:- The computer as a Target :- using a computer to attack other computers . e.g. hacking , virus/worm attacks etc. The computer as a Weapon :- using a computer to commit real world crimes. e.g. cyber terrorism , credit card frauds , pornography etc. 7

Types of CYBER CRIME:

Types of CYBER CRIME HACKING VIRUS ATTACK CREDIT CARD FRAUD PHISHING CYBER DEFAMATION DENIAL OF SERVICE ATTACK SOFTWARE PIRACY NET EXTORTION SPOOFING IRC CRIME 8

HACKING:

HACKING Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker. 9

PowerPoint Presentation:

A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All  computer  viruses are man-made . A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems. 10

CREDIT CARD FRAUD:

CREDIT CARD FRAUD When an individual uses another individuals’ credit card for personal reasons while the owner of the card and the card issuer are not aware of the fact that the card is being used. Further, the individual using the card has no connection with the cardholder or issuer, and has no intention of either contacting the owner of the card or making repayments for the purchases made. 11

PHISHING:

PHISHING Phishing  is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication Phishing emails may contain links to websites that are infected with malware.  Phishing is typically carried out bye email spoofing or  instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. 12

PowerPoint Presentation:

13

Cyber defamation:

Cyber defamation The term defamation is used to define the injury that is caused to the reputation of a person in the eyes of a third person.   The injury can be done by words oral or written, or by signs or by visible representations.   Cyber defamation is a new concept but the traditional definition of the term defamation is application to the cyber defamation as it involves defamation of a person through a new and a virtual medium.  Cyber defamation is publishing of defamatory material against another person with the help of computers or internet. 14

Denial-of-service attack :

Denial-of-service attack In computing, a  denial-of-service attack  ( DoS attack ) or  distributed denial-of-service attack  ( DDoS attack ) is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.. One common method of attack involves saturating the target machine with external communications requests, so much so that it cannot respond to legitimate traffic, or responds so slowly as to be rendered essentially unavailable. 15

Software Piracy:

Software Piracy A term used to describe the act of illegally using, copying or distributing software without purchasing the software or having the legal rights. The majority of software purchased today is purchased as a one-site license, meaning that only one computer may have that software installed on it at one time. Copying that software to multiple computers or sharing it with your friend without multiple licenses is considered illegal and is considered  software piracy. . 16

NET Extortion:

NET Extortion Internet extortion is hacking into and controlling various industry databases (or the threat of), promising to release control back to the company if funds are received or some other demand is satisfied. Similarly, the subject will threaten to compromise information about consumers in the industry database unless funds are received. 17

IRC Crime:

IRC Crime Internet Relay Chat (IRC) is a form of real-time Internet chat. It is mainly designed for group (many-to-many) communication in discussion forums called channels, but also allows one-to-one communication via private message.  Criminal use it for meeting co-conspirators. Hackers use it for discussing their exploits / sharing the techniques. Paedophiles use chat rooms to allure small children. 18

PowerPoint Presentation:

The word "spoof" means to hoax, trick, or deceive. Therefore, in the IT world, spoofing refers tricking or deceiving computer systems or other computer users. This is typically done by hiding one's identity or faking the identity of another user on the Internet. Spoofing can take place on the Internet in several different ways:- E-mail Spoofing IP Spoofing Fake Identity SPOOFING 19

PowerPoint Presentation:

20 Conclusion As someone rightly said that “bytes are replacing bullets in the crime world”. The growth of cyber crime in India, as all over the world, is on the rise and to curb its scope and complexity is the pertinent need today. Cyber space offers a plethora of opportunities for cyber criminals either to cause harm to innocent people, or to make a fast buck at the expense of unsuspecting citizens. India’s profile and wealth have risen enormously in the world due to the constructive use of information technology. At the same time, India ranks fifth in the world for cyber crime, according to a report last year by the U.S.-based Internet Crime Complaint Center, a partnership between the Federal Bureau of Investigation and the National White Collar Crime Center. Even under the IT Act, investigations in India are not easy. This is mainly due to the lack of what is called “cyber forensics.” We know that forensic evidence is important in normal criminal investigations. But the collection and presentation of electronic evidence to prove cyber crimes have posed a challenge to investigation and prosecution agencies and the judiciary. To sum up, India needs a good combination of laws and technology, in harmony with the laws of other countries and keeping in mind common security standards. In the era of e-governance and e-commerce, a lack of common security standards can create havoc for global trade as well as military matters.

PowerPoint Presentation:

Top 10 Steps To Help Stop Cybercrime Education Use a firewall Click with caution Practice safe surfing Practice safe shopping Use comprehensive security software and keep your system updated Secure your wireless network Use strong passwords Use common sense Be suspicious 21

PowerPoint Presentation:

22

PowerPoint Presentation:

23

PowerPoint Presentation:

Name :- Sneha Chaube Class :- S.Y . Computer Science Roll No. :- 03 Taught By :- Mrs. Payal Madhok 24

authorStream Live Help